简体   繁体   English

Windows 2012 BitsTransfer

[英]Windows 2012 BitsTransfer

I have few servers with Windows 2012, but im not able to use Start-BitsTransfer cmdlet. 我的Windows 2012服务器很少,但是我无法使用Start-BitsTransfer cmdlet。 The same cmdlet works fine on Windows server Windows 2012 R2 and 2016. Do you know what should be enabled to in Windows Server 2012? 相同的cmdlet在Windows Server Windows 2012 R2和2016上可以正常工作。您知道在Windows Server 2012中应启用哪些功能吗?

Start-BitsTransfer -source https://... Start-BitsTransfer-源https:// ...

Start-BitsTransfer : An error occurred in the secure channel support At line:1 char:1 + Start-BitsTransfer -source https://... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : InvalidOperation: (:) [Start-BitsTransfer], Exception + FullyQualifiedErrorId : StartBitsTransferCOMException,Microsoft.BackgroundIntelligentTransfer.Management.NewBitsTransferCommand Start-BitsTransfer:安全通道支持中发生错误:在第1行char:1 + Start-BitsTransfer -source https:// ... + ~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~ + + CategoryInfo:InvalidOperation:(:) [Start-BitsTransfer],异常+ FullyQualifiedErrorId:StartBitsTransferCOMException,Microsoft.BackgroundIntelligentTransfer.Management.NewBitsTransferCommand

I believe WS2012 doesn't contain TLS 1.1/1.2 in its SecureProtocols registry key. 我相信WS2012不包含TLS 1.1 / 1.2在其SecureProtocols注册表项。 From Microsoft Support : 来自Microsoft支持

The SecureProtocols registry entry that has value 0xA80 for enabling TLS 1.1 and 1.2 will be added in the following paths: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings 将在以下路径中添加值为0xA80以启用TLS 1.1和1.2的SecureProtocols注册表项:HKEY_CURRENT_USER \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Internet设置HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Internet设置

Per the TLS-SSL Settings article, for TLS 1.1 and 1.2 to be enabled and negotiated on Windows 7, you MUST create the "DisabledByDefault" entry in the appropriate subkey (Client) and set it to "0". 根据“ TLS-SSL设置”一文,要在Windows 7上启用和协商TLS 1.1和1.2,必须在相应的子项(客户端)中创建“ DisabledByDefault”条目,并将其设置为“ 0”。 These subkeys will not be created in the registry since these protocols are disabled by default. 这些子项将不会在注册表中创建,因为默认情况下会禁用这些协议。

Create the necessary subkeys for TLS 1.1 and 1.2; 为TLS 1.1和1.2创建必要的子项; create the DisabledByDefault DWORD values and set it to 0 in the following locations: 在以下位置创建DisabledByDefault DWORD值并将其设置为0:

For TLS 1.1 Registry location: HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\SecurityProviders\\SCHANNEL\\Protocols\\TLS 1.1\\Client DWORD name: DisabledByDefault DWORD value: 0 对于TLS 1.1注册表位置:HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Control \\ SecurityProviders \\ SCHANNEL \\ Protocols \\ TLS 1.1 \\ Client DWORD名称:DisabledByDefault DWORD值:0

For TLS 1.2 Registry location: HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\SecurityProviders\\SCHANNEL\\Protocols\\TLS 1.2\\Client DWORD name: DisabledByDefault DWORD value: 0 对于TLS 1.2注册表位置:HKEY_LOCAL_MACHINE \\ SYSTEM \\ CurrentControlSet \\ Control \\ SecurityProviders \\ SCHANNEL \\ Protocols \\ TLS 1.2 \\ Client DWORD名称:DisabledByDefault DWORD值:0

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM